Sciweavers

766 search results - page 97 / 154
» Detecting modifications in paper documents: a coding approac...
Sort
View
IEEEPACT
2006
IEEE
14 years 3 months ago
Self-checking instructions: reducing instruction redundancy for concurrent error detection
With reducing feature size, increasing chip capacity, and increasing clock speed, microprocessors are becoming increasingly susceptible to transient (soft) errors. Redundant multi...
Sumeet Kumar, Aneesh Aggarwal
ACSAC
2007
IEEE
14 years 3 months ago
MetaAware: Identifying Metamorphic Malware
Detection of malicious software (malware) by the use of static signatures is often criticized for being overly simplistic. Available methods of obfuscating code (so-called metamor...
Qinghua Zhang, Douglas S. Reeves
IWPC
2006
IEEE
14 years 3 months ago
How Developers Copy
Copy-paste programming is dangerous as it may lead to hidden dependencies between different parts of the system. Modifying clones is not always straight forward, because we might ...
Mihai Balint, Radu Marinescu, Tudor Gîrba
ICDAR
2011
IEEE
12 years 8 months ago
Edge-Based Features for Localization of Artificial Urdu Text in Video Images
—Content-based video indexing and retrieval has become an interesting research area with the tremendous growth in the amount of digital media. In addition to the audio-visual con...
Akhtar Jamil, Imran Siddiqi, Fahim Arif, Ahsen Raz...
KBSE
2008
IEEE
14 years 3 months ago
Cleman: Comprehensive Clone Group Evolution Management
—Recent research results have shown more benefits of the management of code clones, rather than detecting and removing them. However, existing management approaches for code clo...
Tung Thanh Nguyen, Hoan Anh Nguyen, Nam H. Pham, J...